2006 IEEE International Conference on Communications 2006
DOI: 10.1109/icc.2006.255128
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and Reacting against Distributed Denial of Service Attacks

Abstract: To cite this version:Yacine Bouzida, Frédéric Cuppens, Sylvain Gombault. Detecting and reacting against distributed denial of service attacks.Abstract-Distributed denial of service attacks (DDoS) are becoming a big threat to the Internet. Recently, some DDoS attacks have infected more than 100, 000 vulnerable hosts over Internet within 10 minutes. Consequences of these attacks can be devastating toward many companies whose security policy against this kind of attacks relies only on reconfiguring firewalls. It … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…[3] illustrates a number of DDoS detection models and a message protocol IDMEF defined by the IETF for coordinative detection of DDoS attacks. [4] proposes a statistical model to detect DDoS attacks and is based on a non-Gaussian modeling of traffic marginals.…”
Section: Associated Workmentioning
confidence: 99%
“…[3] illustrates a number of DDoS detection models and a message protocol IDMEF defined by the IETF for coordinative detection of DDoS attacks. [4] proposes a statistical model to detect DDoS attacks and is based on a non-Gaussian modeling of traffic marginals.…”
Section: Associated Workmentioning
confidence: 99%
“…This had lead corporations and businesses in general, to earn huge profits. One of the most serious threats to these organizations, comes in the form of a Denial-of-Service (DoS) and its larger counterpart Distributed Denial-of-Service (DDoS) attack [5] [6]. The two main objectives of these attacks are, to exhaust computer resources (CPU time, Network bandwidth) so that it makes services unavailable to legitimate users.…”
Section: Introductionmentioning
confidence: 99%
“…Such attacks usually need to inject high-rate flows in order to keep buffers full at all times, and starve legitimate flows. These high-rate attacks, though harmful to the network, are easily detected by the DoS traffic pattern monitors and neutralized [1], [2]. Any DoS attack that manages to degrade the performance of the system through low-rate flow injections is more dangerous as it remains undetected.…”
Section: Introductionmentioning
confidence: 99%